Browse Definitions :

Browse Definitions by Alphabet

STO - SUP

  • storage consolidation - Storage consolidation, also called storage convergence is a method of centralizing data storage among multiple servers.
  • storage container - A storage container is a defined, specific location in high-volume storage.
  • Storage Distributed Resource Scheduler (DRS) - VMware DRS (Distributed Resource Scheduler) is a load balancing utility that assigns and moves computing workloads to available hardware resources in a virtualized environment.
  • storage encryption - Storage encryption is the use of encryption/decryption of backed-up and archived data, both in transit and on storage media.
  • storage filer - A storage filer is a type of file server designed and programmed for high-volume data storage, backup and archiving.
  • storage hypervisor - Storage hypervisors make more efficient use of storage resources in a virtual environment.
  • storage medium (storage media) - In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and makes the data available for retrieval.
  • storage node - A storage node is typically a physical server with one or more hard-disk drives (HDDs) or solid-state drives (SDDs).
  • storage pools - Storage pools are capacity aggregated from disparate physical storage resources in a shared storage environment.
  • storage provisioning - Storage provisioning is the process of assigning storage, usually in the form of server disk drive space, in order to optimize the performance of a storage area network (SAN).
  • storage security - Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks -- and unavailable to other entities.
  • storage snapshot - A storage snapshot is a set of reference markers for data at a particular point in time.
  • storage stack - A storage stack, also called an integrated stack, is a bundled storage product that include servers, networking components and server virtualization software.
  • storage utilization - Storage utilization is a measure of how well the available data storage space in an enterprise is used.
  • storage virtualization - Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage device -- or pool of available storage capacity -- that is managed from a central console.
  • Storage vMotion - Storage vMotion is a component of VMware vSphere that allows the live migration of a running virtual machine's (VM) file system from one storage system to another, with no downtime for the VM or service disruption for end users.
  • storage volume - A storage volume is an identifiable unit of data storage.
  • stored procedure - A stored procedure is a group of statements with a specific name, which are stored inside a database, such as MySQL or Oracle.
  • story - In agile software development, a story is a particular business need assigned to the software development team.
  • story point (story points) - Story points are used in agile project management and development to determine the difficulty of implementing a particular story (business need).
  • storyboard - A storyboard is a graphic organizer that provides the viewer with a high-level view of a project.
  • strategic inflection point - A strategic inflection point is a time period when significant change in the business environment requires an organization to respond effectively or face deterioration.
  • strategic innovation - Strategic innovation is a company's process of reinventing its corporate strategy to encourage growth, create value for the company and its customers, and gain competitive differentiation.
  • strategic leadership - Strategic leadership is a practice in which executives, using different styles of management, develop a vision for their organization that enables it to adapt to or remain competitive in a changing economic and technological climate.
  • strategic management - Strategic management is the ongoing planning, monitoring, analysis and assessment of all necessities an organization needs to meet its goals and objectives.
  • strategic planning - Strategic planning is a process in which an organization's leaders define their vision for the future and identify their organization's goals and objectives.
  • strategic sourcing - Strategic sourcing is an approach to supply chain management that formalizes the way information is gathered and used so that an organization can leverage its consolidated purchasing power to find the best possible values in the marketplace.
  • straw man - In general, a straw man is an object, document, person, or argument that temporarily stands in for and is intended to be "knocked down" by something more substantial.
  • stream cipher - A stream cipher is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to each binary digit in a data stream, one bit at a time.
  • Stream Control Transmission Protocol (SCTP) - Stream Control Transmission Protocol (SCTP) is a connection-oriented network protocol for transmitting multiple streams of data simultaneously between two endpoints that have established a connection in a network.
  • stream processing - Stream processing is a data management technique that involves ingesting a continuous data stream to quickly analyze, filter, transform or enhance the data in real time.
  • streaming application - A streaming application is a program that has its necessary components downloaded as needed instead of being installed ahead of time on a computer.
  • streaming data architecture - A streaming data architecture is an information technology framework that puts the focus on processing data in motion and treats extract-transform-load (ETL) batch processing as just one more event in a continuous stream of events.
  • streaming media - Streaming media is video or audio content sent in compressed form over the Internet and played immediately, rather than being saved to the hard drive.
  • streaming media receiver - A streaming media receiver is a set top box that connects to a television to play content from one or more video streaming services.
  • stress testing - Stress testing is the process of determining the ability of a computer, network, program or device to maintain a certain level of effectiveness under unfavorable conditions.
  • stretched cluster - A stretched cluster is a deployment model in which two or more virtualization host servers are part of the same logical cluster but located in separate geographical locations.
  • string - In programming, a string is a contiguous (see contiguity) sequence of symbols or values, such as a character string (a sequence of characters) or a binary digit string (a sequence of binary values).
  • strobe - In computer or memory technology, a strobe is a signal that is sent that validates data or other signals on adjacent parallel lines.
  • strong authentication - Although it is not a standardized term, with set criteria, strong authentication can be said to be any method of verifying the identity of a user or device that is intrinsically stringent enough to ensure the security of the system it protects by withstanding any attacks it is likely to encounter.
  • strong cryptography - Strong cryptography is used by most governments around the world to protect communications.
  • strong password - A strong password is one that is designed to be hard for a person or program to guess.
  • strongly typed programming language - A strongly typed programming language is one in which each type of data, such as integers, characters, hexadecimals and packed decimals, is predefined as part of the programming language, and all constants or variables defined for a given program must be described with one of the data types.
  • structural ambiguity - Structural or syntactic ambiguity is the potential of multiple interpretations for a piece of written or spoken language because of the way words or phrases are organized.
  • structured data - Structured data is data that has been organized into a formatted repository, typically a database, so that its elements can be made addressable for more effective processing and analysis.
  • structured programming (modular programming) - Structured programming (sometimes known as modular programming) is a programming paradigm that facilitates the creation of programs with readable code and reusable components.
  • Structured Query Language (SQL) - Structured Query Language (SQL) is a standardized programming language that is used to manage relational databases and perform various operations on the data in them.
  • stub - A stub is a small program routine that substitutes for a longer program, possibly to be loaded later or that is located remotely.
  • Stuxnet - The Stuxnet worm is a rootkit exploit that targets supervisory control and data acquisition (SCADA) systems.
  • style sheet - A term extended from print publishing to online media, a style sheet is a definition of a document's appearance in terms of such elements as: The default typeface, size, and color for headings and body text How front matter (preface, figure list, title page, and so forth) should look How all or individual sections should be laid out in terms of space (for example, two newspaper columns, one column with headings having hanging heads, and so forth).
  • subcarrier - A subcarrier is a secondary modulated signal frequency modulated into the main frequency (the carrier) to provide an additional channel of transmission.
  • subnet (subnetwork) - A subnet, or subnetwork, is a segmented piece of a larger network.
  • subnetwork - A subnetwork is a separately identifiable part of a larger network that typically represents a certain limited number of host computers, the hosts in a building or geographic area, or the hosts on an individual local area network.
  • subscription economy - A subscription economy is a model for trade of desired content, products and services in exchange for recurring, scheduled payments.
  • subscription-based pricing model - A subscription-based pricing model is a payment structure that allows a customer or organization to purchase or subscribe to a vendor's IT services for a specific period of time for a set price.
  • substrate - A substrate is a solid substance or medium to which another substance is applied and to which that second substance adheres.
  • Subversion - Subversion is a version control system that keeps track of changes made to files and folders (directories), facilitating data recovery and providing a history of the changes that have been made over time.
  • SuccessFactors Employee Central - SuccessFactors Employee Central is SuccessFactors' integrated suite of human capital management (HCM) cloud applications.
  • SuccessFactors MetaData Framework - The SuccessFactors Metadata Framework is Web-based software that gives SuccessFactors users the ability to create and maintain custom objects, screens and business rules to extend the platform’s functionality.
  • SuccessFactors Presentations - SuccessFactors Presentations is a feature within SuccessFactors software that HR managers can use to create more dynamic talent review presentations.
  • succession planning - Succession planning is a process of developing talent to replace executive, leadership or other key employees when they transition to another role, leave the company, are fired, retire or die.
  • sudo (superuser do) - Sudo (superuser do) is a utility for UNIX- and Linux-based systems that provides an efficient way to give specific users permission to use specific system commands at the root (most powerful) level of the system.
  • suffix - A suffix is something added at the end of a word that conditions its usage or meaning.
  • Sugar - Sugar is a graphical user interface GUI developed for the $100 laptop (XO).
  • summation (sum) - A summation, also called a sum, is the result of arithmetically adding numbers or quantities.
  • Sun Microsystems - Sun Microsystems (often just called "Sun"), the leading company in computers used as Web servers, also makes servers designed for use as engineering workstations, data storage products, and related software.
  • sunk cost (SC) - A sunk cost is money that has already been spent and cannot be recovered.
  • sunk cost effect - The sunk cost effect is the tendency for humans to continue investing in something that clearly isn’t working.
  • sunsetting - Sunsetting, in a business context, is intentionally and gradually phasing something out.
  • supercomputer - A supercomputer is a computer that performs at or near the highest operational rate for computers.
  • superconducting quantum interference device - A superconducting quantum interference device (SQUID) is a mechanism used to measure extremely weak signals, such as subtle changes in the human body's electromagnetic energy field.
  • superconductivity - Superconductivity is the ability of certain materials to conduct electric current with practically zero resistance.
  • supercookie - A supercookie is a type of tracking cookie inserted into an HTTP header by an internet service provider to collect data about a user's internet browsing history and habits.
  • Superdome - Superdome is a high-end 64-bit, Hewlett Packard Enterprise (HPE) PA-8600 processor-based UNIX server designed for e-commerce customers using very large databases.
  • Supermicro - Supermicro is a company that specializes in x86-64 server technology.
  • superposition - Superposition is the ability of a quantum system to be in multiple states at the same time until it is measured.
  • superscalar - Superscalar describes a microprocessor design that makes it possible for more than one instruction at a time to be executed during a single clock cycle.
  • supertasker - A supertasker is someone who performs better when doing multiple things simultaneously than they do when limiting their attention to a single task.
  • superuser - A superuser is a network account with privilege levels far beyond those of most user accounts.
  • supervised learning - Supervised learning is an approach to creating artificial intelligence (AI), where a computer algorithm is trained on input data that has been labeled for a particular output.
  • supervisor call (SVC) - In computers, especially IBM mainframes, a supervisor call (SVC) is a processor instruction that directs the processor to pass control of the computer to the operating system's supervisor program.
  • Supplier performance management (SPM) - Supplier performance management (SPM) is a blanket term for any business practice that is designed to manage, measure and analyze the performance of a supplier or suppliers in a network.
  • supplier relationship management (SRM) - Supplier relationship management (SRM) is the systematic approach to evaluating vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success and developing strategies to improve their performance.
  • supplier risk management - Supplier risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings that are caused by the organization's supply chain.
  • supply and demand - The laws of supply and demand are the observed relationships between the amount of something that is available for purchase, the level of desire consumers have to buy it and the price.
  • supply chain - A supply chain is the network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product.
  • supply chain analytics - Supply chain analytics refers to the processes organizations use to gain insight and extract value from the large amounts of data associated with the procurement, processing and distribution of goods.
  • supply chain attack - A supply chain attack is a type of cyber attack that targets organizations by focusing on weaker links in an organization's supply chain.
  • supply chain execution (SCE) - Supply chain execution (SCE) is the flow of tasks involved in the supply chain, such as order fulfilment, procurement, warehousing and transporting.
  • supply chain finance - Supply chain finance is a set of technology-enabled business and financial processes that provides flexible payment options for a buyer and one of their suppliers at lower financing costs.
  • supply chain management (SCM) - Supply chain management (SCM) is the optimization of a product's creation and flow from raw material sourcing to production, logistics and delivery to the final customer.
  • Supply Chain Operations Reference (SCOR) - Supply Chain Operations Reference (SCOR) is the process reference model used across industries as a supply chain management diagnostic tool.
  • Supply Chain Planning (SCP) - Supply chain planning (SCP) is the process of anticipating the demand for products and planning their materials and components, production, marketing, distribution and sale.
  • supply chain risk management (SCRM) - Supply chain risks include cost volatility, material shortages, supplier financial issues and disasters.
  • supply chain security - Supply chain security is the part of supply chain management that focuses on the risk management of external suppliers, vendors, logistics and transportation.
  • supply chain sustainability (SCS) - Supply chain sustainability (SCS) is a holistic view of supply chain processes, logistics and technologies that affect the environmental, social, economic and legal aspects of a supply chain's components.
  • supply chain transformation - Supply chain transformation is the addition and integration of technology to improve supply chain performance.
  • supply chain visibility (SCV) - Supply chain visibility (SCV) is the ability of parts, components or products in transit to be tracked from manufacturer to final destination.
  • supply-side platform (SSP) - A supply-side platform (SSP) is a software system that allows publishers to offer their available inventory to ad exchanges and demand-side platforms (DSP)s.
  • support - In information technology, support refers to functionality that is provided between or among products, programs, devices, modes, or accessories.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close